April 20, 2004, Vienna, Austria

The CfP is now closed. Participation in the workshop is restricted to contributors. If you feel you can contribute and want to attend the workshop, but haven't submitted a paper, please contact the organisers (sppc04@inf.ethz.ch).

Call for Papers

Scope

The overall aim of the workshop is to understand, analyze and propose models exploiting the relationship between mechanisms for trust, security, privacy, and context in pervasive environments. This different view on the state-of-the-art could revolutionize the way we see the "big pervasive security picture", and lead to more coherent research, architectures and protocols.

Contributions

We solicit short papers (max. 10 pages) and extended abstracts (2-5 pages) of ongoing work, recent results and position statements that encompass at least two of the workshop's core themes: security, privacy, trust and context-awareness. Papers will be peer-reviewed and will be selected according to their significance to the scope of the workshop, their quality of presentation and their ability to stimulate discussions.

Contributions must be sent by email to sppc04@inf.ethz.ch by February 14, 2004February 22, 2004 and should be in PDF or PostScript format.

The next time someone asks to use your office...

When someone asks you to use your office, what goes through your mind? Is it the probability that they may make an overseas call? Is it the fear that they may browse your high profile or confidential documents lying on the table? Or in the case of a total stranger, how did they know that your office was available in the first place? Certainly it is not easy to deal with all these questions at once in everyday life, but somehow we do - or don't. As the reality of pervasive computing becomes more and more apparent, these requests become more subtle, frequent and potentially impacting.

Consider recent technology and ongoing advances. Devices embedded in smart environments and worn on our bodies will communicate seamlessly about any number of different things. In such kind of interactions, huge amounts of information are shared and exchanged. Even though this may be the means of enjoying context-based and other enhanced services, there is an increased risk involved in some of these interactions and collaborations, if collaborators are about to use our private possessions. This further illustrates how combined assessment of the interrelationships between trust, security, privacy and context aid in confident decision-making. In every-day life we do not treat these concerns in isolation; we actually make spontaneous decisions that are based on maintaining a "comfortable" balance. Although we do not completely understand these basic building blocks, the potential trade-offs are intuitively understood, even if technically under-explored.

Goals of the Workshop

Understand principle problems within each theme but moreover the transitive effects on each other

Classify ongoing research in these themes from different community perspectives

Foster active relationships between researchers in these fields & to define collaborative research

Workshop Format

The number of presented papers is restricted to allow a highly interactive workshop format. Apart from the presentation of papers, the programme will include moderated discussions and break-out sessions based on specific interface discussions and position statements.